Ask the Experts
Ask the Experts
-
Periods processing on DoD systems
-
Risks associated with Reverse-Proxy
-
Security associated with layers of the OSI model
-
Using NAT rules to map to DMZ
-
Role and placement of a DMZ on a network
-
Dedicated vs. host-based firewalls
-
Firewall protection for remote users
-
Hardware requirements for implementing a firewall
-
Firewall standards
-
Implementing runtime process integrity checking for Unix & Linux
-
Bypassing the firewall
-
Security standards for outsourcing agreements
-
Protecting a Web server from external attack
-
The placement of security solutions on a network
-
When to use PKI
-
Frame relay vs. VPNs
-
Turning off port 1080
-
Evolution of the firewall
-
Viruses & CMOS
-
Identifying and removing Back Orifice
-
The difference between a virus and a worm
-
Generic PKI CA threat model
-
Dynamic Host Configuration Protocol and security
-
Disabling the option to save a password on Internet Explorer
-
The difference between a VPN box and Firewall VPN
-
What makes a good firewall
-
Implementing SSH
-
The risks of deploying distributed firewalls
-
PKI breaches
-
Firewall configuration
-
Legal issues associated with logon banners
-
The pros and cons of using a honeypot
-
Developing security applications with Java
-
How single sign-on works
-
The difference between IPSEC and PPTP
-
Basic security issues
-
Split tunneling in a VPN environment & the security of 3DES encryption
-
Preventing unauthorized downloads
-
Mainframe vs. client server
-
Where to terminate a VPN
-
Web browser buttons
-
Participants in the policy development process
-
Security methods vs. technologies
-
Securing an operating system with a firewall
-
Vendor-neutral vs. vendor-specific security training